Skip to content
Snippets Groups Projects
Commit 069f9514 authored by ArthurSens's avatar ArthurSens
Browse files

Psp should be deployed at the same namespace as kube-prometheus stack

parent f5f72e1b
No related branches found
No related tags found
No related merge requests found
...@@ -59,6 +59,7 @@ local restrictedPodSecurityPolicy = { ...@@ -59,6 +59,7 @@ local restrictedPodSecurityPolicy = {
kind: 'Role', kind: 'Role',
metadata: { metadata: {
name: 'alertmanager-' + $.values.alertmanager.name, name: 'alertmanager-' + $.values.alertmanager.name,
namespace: $.values.common.namespace,
}, },
rules: [{ rules: [{
apiGroups: ['policy'], apiGroups: ['policy'],
...@@ -73,6 +74,7 @@ local restrictedPodSecurityPolicy = { ...@@ -73,6 +74,7 @@ local restrictedPodSecurityPolicy = {
kind: 'RoleBinding', kind: 'RoleBinding',
metadata: { metadata: {
name: 'alertmanager-' + $.values.alertmanager.name, name: 'alertmanager-' + $.values.alertmanager.name,
namespace: $.values.common.namespace,
}, },
roleRef: { roleRef: {
apiGroup: 'rbac.authorization.k8s.io', apiGroup: 'rbac.authorization.k8s.io',
...@@ -126,6 +128,7 @@ local restrictedPodSecurityPolicy = { ...@@ -126,6 +128,7 @@ local restrictedPodSecurityPolicy = {
kind: 'Role', kind: 'Role',
metadata: { metadata: {
name: 'grafana', name: 'grafana',
namespace: $.values.common.namespace,
}, },
rules: [{ rules: [{
apiGroups: ['policy'], apiGroups: ['policy'],
...@@ -140,6 +143,7 @@ local restrictedPodSecurityPolicy = { ...@@ -140,6 +143,7 @@ local restrictedPodSecurityPolicy = {
kind: 'RoleBinding', kind: 'RoleBinding',
metadata: { metadata: {
name: 'grafana', name: 'grafana',
namespace: $.values.common.namespace,
}, },
roleRef: { roleRef: {
apiGroup: 'rbac.authorization.k8s.io', apiGroup: 'rbac.authorization.k8s.io',
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment